[Pearg] ***UNCHECKED*** Asymmetrical communication endpoints (ACE) to ultimately enhance data privacy and data security of enduser computers

Heinrich Feuerbach <info@feuerbach.info> Fri, 05 June 2020 16:54 UTC

Return-Path: <info@feuerbach.info>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 855693A08FC for <pearg@ietfa.amsl.com>; Fri, 5 Jun 2020 09:54:29 -0700 (PDT)
X-Quarantine-ID: <erZZxmC8Y3hr>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BANNED, message contains application/pgp-encrypted,.pgp,.pgp.asc,AD72F782.asc,UNDECIPHERABLE
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level:
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id erZZxmC8Y3hr for <pearg@ietfa.amsl.com>; Fri, 5 Jun 2020 09:54:27 -0700 (PDT)
Received: from rsi20.gerwanserver.de (rsi20.gerwanserver.de [IPv6:2a02:2260:2::5bdc:227f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D153A3A090A for <pearg@irtf.org>; Fri, 5 Jun 2020 09:54:26 -0700 (PDT)
Received: from RR (83.5.154.60.ipv4.supernova.orange.pl [83.5.154.60]) by rsi20.gerwanserver.de (Postfix) with ESMTPSA id AB39859E117 for <pearg@irtf.org>; Fri, 5 Jun 2020 18:54:23 +0200 (CEST)
Date: Fri, 05 Jun 2020 18:48:33 +0200
From: Heinrich Feuerbach <info@feuerbach.info>
To: "pearg@irtf.org" <pearg@irtf.org>
Message-ID: <20200605184833.3d8dbe74@RR>
Organization: Feuerbach-Informatik
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha1"; boundary="Sig_/BNy1VV/6RNwuLjqIX3I9vDI"; protocol="application/pgp-signature"
X-PPP-Message-ID: <159137606402.23791.4810309311367625120@rsi20.gerwanserver.de>
X-PPP-Vhost: feuerbach.info
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/-bj8vlt-IcKUJI3y1HfmJBulRXg>
Subject: [Pearg] ***UNCHECKED*** Asymmetrical communication endpoints (ACE) to ultimately enhance data privacy and data security of enduser computers
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2020 16:54:30 -0000

  Dear members of the pearg mailing list,

today I would like to introduce you to an invention I made to guarantee
in a physical manner the privacy of data of endpoints like PCs and
Laptops and other computers used for communication via the internet.

The physical way to ensure privacy is by asymmetry between "sending"
and "receiving" to and from the networks like the internet, so
to separate in, but have co-working systems for sending and receiving
instead of just one system for both sending and receiving.
Asymmetria in this sense is not as often used for describing different
speeds for download and upload. 

Following this asymmetry, these advantages can be reached regarding the
privacy and data security, to name just a few:

- the sender part of the system and its data is immune to any hacker
  attacks, as not being reachable via the network (just sending, not
  receiving anything) 

- the receiver may further receive like in symmetrical communicating
  systems malware etc., however, the malware can't send anything back
  into the network like the internet. Therefore, any espionage on the
  data hosted on the receiver can't be successful. As well, spreading of
  infections from one computer to another is not longer possible then.

- as data is held on both systems, sender and receiver in parallel, any
  ransomware-like attack can be fixed easily. 

To make use of these big advantages (and many more), it is needed,
beneath other issues, to solve the protocol gap problem in
asymmetrical systems.
I solved these issues already and put beneath the theory also a
working proof of concept onto my website for download and evaluation:

https://firewalls.feuerbach.info

File: AKE_PoC.tar.gz

Source code is as well in the gzipped tarball. The tarball is
electronically signed by me. You may use and redistribute the tarball.
Please check the README.odt inside the tarball as well for any
productive/commercial usage.


Thank you for your time.

Heinrich Feuerbach